


default search action
Yi-Hsuan Lee
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c6]Yi-Hsuan Lee, Wei-Hao Chen, Shi-Yu Huang:
Self-Sufficient Clock Jitter Measurement Methodology Using Dithering-Based Calibration. ITC-Asia 2023: 1-6 - 2021
- [j14]Yi-Hsuan Lee, Chan Hsiao, Jingjing Weng
, Yi-Hsuan Chen:
The impacts of relational capital on self-disclosure in virtual communities: A cross-level analysis of key moderators. Inf. Technol. People 34(1): 228-249 (2021) - [j13]Yi-Hsuan Lee
, Sheng-Jia Jian:
Effective partitioning mechanisms for time-evolving graphs in the Flink system. J. Supercomput. 77(11): 12336-12354 (2021) - [c5]Yi-Hsuan Lee, Shi-Yu Huang:
Rigorous Test Flow for PLL to Identify Weak Devices. ITC-Asia 2021: 1-6
2010 – 2019
- 2018
- [j12]Yi-Hsuan Lee, Ying-Che Hsieh
, Chan Hsiao, Chen-Hsiang Lin:
From virtual worlds to reality: Moderating and mediating mechanisms between online and offline leadership. Inf. Technol. People 31(2): 557-577 (2018) - 2017
- [j11]Yi-Hsuan Lee, Kuo-Chan Huang, Meng-Ru Shieh, Kuan-Chou Lai
:
Distributed resource allocation in federated clouds. J. Supercomput. 73(7): 3196-3211 (2017) - [c4]Chao-Chun Yeh, Han-Lin Lu, Yi-Hsuan Lee, Wei-Sheng Chou, Shih-Kun Huang:
CRAXTriage: A coverage based triage system. DSC 2017: 408-415 - 2015
- [j10]Chien-Yu Liu, Kuo-Chan Huang, Yi-Hsuan Lee, Kuan-Chou Lai:
Efficient Resource Allocation Mechanism for Federated Clouds. Int. J. Grid High Perform. Comput. 7(4): 74-87 (2015) - [c3]Hsin Tse Lu, Po Hsuan Wu, Chia Hung Kao, Yi-Hsuan Lee:
hpNFS: A Hierarchical Approach for the Parallel Network File System. UCC 2015: 414-415 - 2014
- [j9]Yi-Hsuan Lee, Chan Hsiao, Chin-Husan Ho:
The effects of various multimedia instructional materials on students' learning responses and outcomes: A comparative experimental study. Comput. Hum. Behav. 40: 119-132 (2014) - [j8]Yi-Hsuan Lee, Yen-Nan Lin, Chao-Chun Chuang, Chung-Chuan Lo
:
SPIN: A Method of Skeleton-Based Polarity Identification for Neurons. Neuroinformatics 12(3): 487-507 (2014) - [c2]Chan Hsiao, Yi-Hsuan Lee, Yi-Hsuan Li:
The role of social capital and knowledge sharing in transformational leadership promoting value co-creation -A cross-level analysis. CSCWD 2014: 330-335 - [c1]Chia Hung Kao, Ping-Hsien Chi, Yi-Hsuan Lee:
Automatic Testing Framework for Virtualization Environment. ISSRE Workshops 2014: 134-135 - 2013
- [j7]Yi-Hsuan Lee, Yi-Chuan Hsieh, Yen-Hsun Chen:
An investigation of employees' use of e-learning systems: applying the technology acceptance model. Behav. Inf. Technol. 32(2): 173-189 (2013) - 2011
- [j6]Yi-Hsuan Lee, Yi-Chuan Hsieh, Chia-Ning Hsu:
Adding Innovation Diffusion Theory to the Technology Acceptance Model: Supporting Employees' Intentions to use E-Learning Systems. J. Educ. Technol. Soc. 14(4): 124-137 (2011) - [j5]Yi-Hsuan Lee, Yi-Chuan Hsieh, Chun-Yuan Ma:
A model of organizational employees' e-learning systems acceptance. Knowl. Based Syst. 24(3): 355-366 (2011)
2000 – 2009
- 2008
- [j4]Yao-Ting Sung, Kuo-En Chang, Yi-Hsuan Lee, Wen-Cheng Yu:
Effects of a Mobile Electronic Guidebook on Visitors' Attention and Visiting Behaviors. J. Educ. Technol. Soc. 11(2): 67-80 (2008) - 2007
- [j3]Yi-Hsuan Lee, Cheng Chen:
An effective and efficient code generation algorithm for uniform loops on non-orthogonal DSP architecture. J. Syst. Softw. 80(3): 410-428 (2007) - [j2]Yi-Hsuan Lee, Cheng Chen:
An Efficient Code Generation Algorithm for Non-orthogonal DSP Architecture. J. VLSI Signal Process. 47(3): 281-296 (2007) - 2005
- [j1]Yi-Hsuan Lee, Cheng Chen:
A two-level scheduling method: an effective parallelizing technique for uniform nested loops on a DSP multiprocessor. J. Syst. Softw. 75(1-2): 155-170 (2005)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 13:06 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint